Search Results - (( java implementation rsa algorithm ) OR ( changes data replication algorithm ))
Search alternatives:
- replication algorithm »
- java implementation »
- implementation rsa »
- rsa algorithm »
- changes data »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of read-one-write-all synchronization transaction daemon (row A-STD) in distributed system
Published 2010“…In distributed system environment, replicated data is the current trend to keep data updated in multiple sites. …”
Get full text
Get full text
Research Report -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
Get full text
Get full text
Thesis -
8
-
9
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…Unlike existing biometric techniques such as fingerprint and face, vein patterns are inside the body, making them virtually impossible to replicate. This also makes finger-vein biometrics a more secure alternative without being susceptible to forgery, damage, or change with time. …”
Get full text
Get full text
Get full text
Article -
10
An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali
Published 2025“…The hardware integration combines vibration sensor, DC motor with encoders and Arduino Uno microcontroller that supported by Python for real-time data processing, user interface visualization and data storage. …”
Get full text
Get full text
Thesis -
11
GLCM correlation approach for blood vessel identification in thermal image
Published 2019“…The maturity of detection in emotions via thermal camera is evolving recently since it is able to detect the “hot” parts of human face composition replicating the area of blood vessels. The notion of non-invasive tools for data gatherings via a thermal camera has also been vigorously highlighted. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
